Weiqing Sun
Orcid: 0000-0002-6973-0509
According to our database1,
Weiqing Sun
authored at least 51 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Entropy, June, 2024
2023
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system.
J. High Speed Networks, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets.
SN Comput. Sci., 2022
An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System.
IEEE Access, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
SpamFender: A Semi-supervised Incremental Spam Classification System across Social Networks.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner Attack.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Dynamic State Estimation for Power System Based on the Measurement Data Reconstructed by RGAN.
IEEE Access, 2021
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Joint Planning and Operation for Renewable- Storage Under Different Financial Incentives and Market Mechanisms.
IEEE Access, 2020
Coordinated Planning With Predetermined Renewable Energy Generation Targets Using Extended Two-Stage Robust Optimization.
IEEE Access, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020
2019
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
2017
Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation.
Simul., 2017
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017
2016
EAI Endorsed Trans. Security Safety, 2016
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016
2015
EAI Endorsed Trans. Scalable Inf. Syst., 2015
GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation.
EAI Endorsed Trans. Mob. Commun. Appl., 2015
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015
Proceedings of the 12th International Conference on Information Technology, 2015
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
2014
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014
2013
IEEE Trans. Smart Grid, 2013
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2012
FPGA based device specific key generation method using Physically Uncloanble Functions and neural networks.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012
FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence.
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the IEEE Asian Solid State Circuits Conference, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids.
IEEE Trans. Smart Grid, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Research on Transaction-Item Association Matrix Mining Algorithm in Large-scale Transaction Database.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
2008
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2005
Proceedings of the Network and Distributed System Security Symposium, 2005